Sciweavers

200 search results - page 17 / 40
» Providing anonymity services in SIP
Sort
View
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 4 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz
ESORICS
2008
Springer
13 years 11 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
PERCOM
2009
ACM
14 years 4 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
ICC
2007
IEEE
101views Communications» more  ICC 2007»
14 years 4 months ago
Multi-Device Seamless Service by User-Oriented Session in All-IP Network
—Evolutionary development towards all-IP networks will have various kinds of devices connected to the Internet. In such the ubiquitous networking environment with the features of...
Naoki Imai, Manabu Isomura, Hiroki Horiuchi
HOTOS
2003
IEEE
14 years 3 months ago
Privacy-Aware Location Sensor Networks
Advances in sensor networking and location tracking technology enable location-based applications but they also create significant privacy risks. Privacy is typically addressed t...
Marco Gruteser, Graham Schelle, Ashish Jain, Richa...